Connector Guides › Connectors Guide › Connecting to Endpoints › CA ACF2 Connector › Attributes That Are Marked "Interesting To Compliance"
Attributes That Are Marked "Interesting To Compliance"
Most of the attributes that are marked "Interesting to Compliance" are Boolean. When you import into CA RCM, only those with the value of TRUE are imported. Any attributes which are set to FALSE will not appear in your data.
The following attributes are marked "Interesting to Compliance", for use by CA RCM:
- Account
- Audit
- Autodump
- Batch Job
- Bypass Label Processing
- CICS
- CMD Prop
- Consult
- IMS
- Leader
- Limited bypass label processing
- Non-cancel
- Prefix
- ReadAll
- Restrict
- RSRC Vld
- Rulevld
- Security
- Started Task
- Store Rule
- Submit Authority (JCL)
- TSO
- Tso Trace
These attributes can be found on the MVS Privileges 1, MVS Privileges 2, and MVS TSO 2 tabs.
CA Arcot Connector
After you have set up a connection to a CA Arcot WebFort endpoint, you can use Identity Manager to do the following tasks:
- Create, view, and modify WebFort users
- Generate, view, and modify OTP, ArcotID, and QnA credentials
- View and modify ArcotOTP credentials
Note: You cannot use Identity Manager to create ArcotOTP credentials.
After you have set up a connection to CA Arcot RegFort, you can use CA Identity Manager to do the following tasks:
- Create certificate provisioning tasks for Arcot users directly or using an account template
- Invalidate any pending certificate provisioning tasks of an Arcot user
- View pending and completed certificate provisioning tasks
- List the certificates that have been issued for an Arcot user, and the status of those certificates
- Manage each certificate through its lifecycle. For example:
- Create Certificate Provisioning Tasks (CPTs) to generate certificates for a new employee’s smartcard
- When the CPT completed or the certificate is downloaded to the smartcard, the Life Cycle Management (LCM) shows that the certificate is ACTIVE.
- When the validity of the certificate is finished, the certificate's status changes to EXPIRED.
- If the employee resigns, then you can use the LCM action REVOKE, which changes the certificate's status to REVOKED.
Note: To see a list of supported objects and attributes, or to download the endpoint guide, see the Download page for Endpoint Guides for CA Identity Manager.